首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The promise of mobile devices lies not in their capacity to duplicate the capabilities of desktop machines, but rather in their promise of enabling location-specific tasks. One of the challenges that must be addressed if they are to be used in this way is how intuitive interfaces for mobile devices can be designed that enable access to location-specific services usable across locations. We are developing a prototype mobile valet application that presents location-specific services organised around the tasks associated with a location. The basic elements of the interface exploits commonalties in the way we address tasks at various locations just as the familiar “file” and “edit” menus in various software applications exploit regularities in software tasks.  相似文献   

2.
This paper provides empirical results concerning the negotiation of access and joinability by mobile phone users. It shows how access is embedded in a gift-giving economy (giving one’s number for example). It also shows that the more users make themselves available on the mobile phone, the more their mobile phone traffic increases (both incoming and outgoing). This remarkable result is discussed in terms of the reciprocity involved in the management of mobile phone relationships.  相似文献   

3.
A major contributor to the failure of information technology-based systems is the problem of understanding user or customer requirements in the initial analysis and requirements identification stage of development. This paper identifies and describes an approach to help overcome some of these problems, particularly the mismatch or understanding gap between the customer and the developer. The approach is intended to be used at the early stages of requirement determination and introduces techniques from operational research into the process. In particular set theory and Venn diagrams are used as a way of graphically representing the relationships and gaps in understanding that may exist. The benefit obtained from the use of the technique is partly in the graphical representations themselves but mainly in the dialogue and negotiation that result from the construction of the diagrams. The technique has been developed in a research study of retail organisations’ use of information technology in the UK and an example case study from the sector is used to illustrate and discuss the technique.  相似文献   

4.
Overcoming the Lack of Screen Space on Mobile Computers   总被引:5,自引:0,他引:5  
One difficulty for interface design on mobile computers is lack of screen space caused by their small size. This paper describes a small pilot study and two formal experiments that investigate the usability of sonically-enhanced buttons of different sizes. The underlying hypothesis being that presenting information about the buttons in sound would increase their usability and allow their size to be reduced. An experimental interface was created that ran on a 3Com Palm III mobile computer and used a simple calculator-style interface to enter data. The buttons of the calculator were changed in size between 4×4, 8×8 and 16×16 pixels and used a range of different types of sound from basic to complex. Results showed that sounds significantly improved usability for both standard and small button sizes – more data could be entered with sonically-enhanced buttons and subjective workload reduced. More sophisticated sounds that presented more information about the state of the buttons were shown to be more effective than the standard Palm III sounds. The results showed that if sound was added to buttons then they could be reduced in size from 16×16 to 8×8 pixels without much loss in quantitative performance. This reduction in size, however, caused a significant increase in subjective workload. Results also showed that when a mobile device was used in a more realistic situation (whilst walking outside) usability was significantly reduced (with increased workload and less data entered) than when used in a usability laboratory. These studies show that sound can be beneficial for usability and that care must be taken to do testing in realistic environments to get a good measure of mobile device usability.  相似文献   

5.
Patterns of Mobile Interaction   总被引:1,自引:0,他引:1  
The design of systems for mobile scenarios covers a wide range of issues, ranging from mobile networking to user interface design for mobile devices. Mobile applications often run distributed on several connected devices, used by many users simultaneously. Considering all issues related to mobile scenarios, a designer might be overwhelmed. As a solution, we propose a specific kind of design patterns which we call mobility patterns, derived from successful mobile applications. They allow a designer to re-use design elements as building blocks in their own designs. After describing the idea of mobility patterns, we give a brief overview of patterns we have identified so far. Two patterns are described in more detail with the help of our research platforms QuickStep and Pocket DreamTeam.  相似文献   

6.
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore, we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our considerations with a classification of new and existing metaphors using our taxonomy.  相似文献   

7.
8.
Accessibility and high quality of interaction with products, applications, and services by anyone, anywhere, and at any time are fundamental requirements for universal access in the emerging Information Society. This paper discusses these requirements, and their relation to the concept of automated adaptation of user interfaces. An example application is presented, showing how adaptation can be used to accommodate the requirements of different user categories and contexts of use. This application is then used as a vehicle for discussing a new engineering paradigm appropriate for the development of adaptation-based user interfaces. Finally, the paper investigates issues concerning the interaction technologies required for universal access. Published online: 23 May 2001  相似文献   

9.
Configuring the Mobile User: Sociological and Industry Views   总被引:2,自引:2,他引:0  
This article considers the role of the consumer in the diffusion of mobile telecommunications technologies. There is presently little research on the consumption and use of mobile technologies, and the aim of the present paper is to facilitate discussion about the way consumer behaviour is currently understood in industry and academia. The paper considers key themes in social science research on mobile ICTs, and understandings of the consumer held by those in the mobile industry. Bringing these understandings together, we reiterate the now well attested view that the diffusion and consumption of mobile telephony and computing cannot be understood without investigating the contexts and processes of their use in everyday life.  相似文献   

10.
Context Awareness and Mobile Phones   总被引:1,自引:1,他引:0  
This paper investigates some aspects of how context-awareness can support users of mobile phones, in particular the calling party. The use of mobile and stationary phones is discussed in relation to situational properties of a phone conversation, especially with regards to who might benefit from context-awareness in this context. An initial hypothesis is that mobile phone users communicate context information to each other (verbally) to a much higher degree than do stationary phone users. Mobile phone users could benefit much from context awareness technology, in particular when about to make a call, if they can receive context information regarding the person they are trying to reach prior to establishing the call. We argue that such technology should require low amounts of explicit user interaction, and could lead to less disrupting calls in inappropriate moments, as well as less frustration for the calling party when a call is not answered.  相似文献   

11.
This paper analyses the shifting identity of the mobile phone in the light of research carried out in 1996 on a representative population sample from five major European countries: Italy, UK, France, Germany and Spain. A total of 6609 people were interviewed by means of a telephone survey. The mobile phone emerged as a charismatic technology compared to other mobile technologies (laptop and car phone) and as a leading technology that, in just a few years, has appropriated 11% of total telephone traffic. It has “dragged” its widespread presence and amount of use from the workplace to the domestic sphere, although in Italy, where it has had greatest success, its widespread use has been detached from its use in the workplace. Another emerging result is that the use of the mobile phone is not correlated to strong residential mobility in individuals.  相似文献   

12.
The basis of this study was the ageing of the population all over the world. The study concentrated on finding out the key service needs of elderly people. The service needs from the end users’ as well as the experts’ perspective were gathered by means of various group methods such ideation sessions. Four mobile communication service concepts were created using these groups’ opinions. After diverse communication, these concepts were tested by the elderly. The research methods comprised a user study and a concept study.  Based on the results, the needs could be prioritised. Additionally, the main trend of the results confirmed the opinions presented in the literature. One important finding was the positive opinions about additional value of wireless devices and services. This knowledge can be used in mobile communication product development. Most of the elderly are ready to accept new forms of mobile communication service. Ease of use and actual need of the services are important criteria. The elderly are ready to begin using the services as long as they truly facilitate independent living.  相似文献   

13.
This paper is based on a study of the ways in which a group negotiated the use of a new mobile technology. The group was made up of ski instructors who, during a one-week ski trip, were equipped with a mobile awareness device called the Hummingbird. The group was studied using ethnomethodologically inspired qualitative methods, with the focus on the group members’ different views of the Hummingbird’s intended use. Negotiations of use occurred using two methods: talk and action. The users negotiated issues such as where and when to use the technology, and whether to consider the Hummingbird a work tool or a gadget for social events. Further, the empirical results clearly show how negotiations of new, mobile technology differ from stationary technology.  相似文献   

14.
This paper examines the social meaning behind the adoption of mobile telephones by teenagers in Norway. Through this adoption process one can see the way in which youths are developing their adult identity as well as their gendered identity. The primary database used in this analysis is from two telephone questionnaires of Norwegian youth aged 13–20 carried out in October and December 1998. A total of 2007 interviews are included. The survey instrument covered teenagers’ ownership of mobile telephones, payment forms and the use of mobile telephones to send and receive Short Message System (SMS) text messages. In addition, the analysis draws on a survey of 1001 Norwegian parents and ethnographic interviews of 12 families.  相似文献   

15.
Mobile devices such as cameras or mobile phones can be used as props; actively to convey a specific impression to people in the vicinity and to feel better when interacting with them. Based on field studies and interviews, three aspects of users acting with mobile devices are described: warm versus cold devices; how a mobile device conveys a specific impression by association to similar devices and specific situations of use; and how the characteristics of a mobile device may open or restrict the body language of the user.  相似文献   

16.
A path-method is used as a mechanism in object-oriented databases (OODBs) to retrieve or to update information relevant to one class that is not stored with that class but with some other class. A path-method is a method which traverses from one class through a chain of connections between classes and accesses information at another class. However, it is a difficult task for a casual user or even an application programmer to write path-methods to facilitate queries. This is because it might require comprehensive knowledge of many classes of the conceptual schema that are not directly involved in the query, and therefore may not even be included in a user's (incomplete) view about the contents of the database. We have developed a system, called path-method generator (PMG), which generates path-methods automatically according to a user's database-manipulating requests. The PMG offers the user one of the possible path-methods and the user verifies from his knowledge of the intended purpose of the request whether that path-method is the desired one. If the path method is rejected, then the user can utilize his now increased knowledge about the database to request (with additional parameters given) another offer from the PMG. The PMG is based on access weights attached to the connections between classes and precomputed access relevance between every pair of classes of the OODB. Specific rules for access weight assignment and algorithms for computing access relevance appeared in our previous papers [MGPF92, MGPF93, MGPF96]. In this paper, we present a variety of traversal algorithms based on access weights and precomputed access relevance. Experiments identify some of these algorithms as very successful in generating most desired path-methods. The PMG system utilizes these successful algorithms and is thus an efficient tool for aiding the user with the difficult task of querying and updating a large OODB. Received July 19, 1993 / Accepted May 16, 1997  相似文献   

17.
Abstract. With rapid advances in computer and communication technologies, there is an increasing demand to build and maintain large image repositories. To reduce the demands on I/O and network resources, multi-resolution representations are being proposed for the storage organization of images. Image decomposition techniques such as wavelets can be used to provide these multi-resolution images. The original image is represented by several coefficients, one of them with visual similarity to the original image, but at a lower resolution. These visually similar coefficients can be thought of as thumbnails or icons of the original image. This paper addresses the problem of storing these multi-resolution coefficients on disks so that thumbnail browsing as well as image reconstruction can be performed efficiently. Several strategies are evaluated to store the image coefficients on parallel disks. These strategies can be classified into two broad classes, depending on whether the access pattern of the images is used in the placement. Disk simulation is used to evaluate the performance of these strategies. Simulation results are validated with results from experiments with real Disks, and are found to be in good qualitative agreement. The results indicate that significant performance improvements can be achieved with as few as four disks by placing image coefficients based upon browsing access patterns. Work supported by a research grant from NSF/ARPA/NASA IRI9411330 and NSF instrumentation grant CDA-9421978 and NSF Career grant No. IIS-9985019, and NSF grant 0010044-CCR.  相似文献   

18.
The combination of SGML and database technology allows to refine both declarative and navigational access mechanisms for structured document collection: with regard to declarative access, the user can formulate complex information needs without knowing a query language, the respective document type definition (DTD) or the underlying modelling. Navigational access is eased by hyperlink-rendition mechanisms going beyond plain link-integrity checking. With our approach, the database-internal representation of documents is configurable. It allows for an efficient implementation of operations, because DTD knowledge is not needed for document structure recognition. We show how the number of method invocations and the cost of parsing can be significantly reduced. Edited by Y.C. Tay. Received April 22, 1996 / Accepted March 16, 1997  相似文献   

19.
This paper provides an overview of a project aimed at using knowledge-based technology to improve accessibility of the Web for visually impaired users. The focus is on the multi-dimensional components of Web pages (tables and frames); our cognitive studies demonstrate that spatial information is essential in comprehending tabular data, and this aspect has been largely overlooked in the existing literature. Our approach addresses these issues by using explicit representations of the navigational semantics of the documents and using a domain-specific language to query the semantic representation and derive navigation strategies. Navigational knowledge is explicitly generated and associated to the tabular and multi-dimensional HTML structures of documents. This semantic representation provides to the blind user an abstract representation of the layout of the document; the user is then allowed to issue commands from the domain-specific language to access and traverse the document according to its abstract layout. Published online: 6 November 2002  相似文献   

20.
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of system architecture, and the software has a key role to play in conserving battery energy on these devices. With the increasing popularity of spatial database applications, and their anticipated deployment on mobile devices (such as road atlases and GPS-based applications), it is critical to examine the energy implications of spatial data storage and access methods for memory resident datasets. While there has been extensive prior research on spatial access methods on resource-rich environments, this is, perhaps, the first study to examine their suitability for resource-constrained environments. Using a detailed cycle-accurate energy estimation framework and four different datasets, this paper examines the pros and cons of three previously proposed spatial indexing alternatives from both the energy and performance angles. Specifically, the Quadtree, Packed R-tree, and Buddy-Tree structures are evaluated and compared with a brute-force approach that does not use an index. The results show that there are both performance and energy trade-offs between the indexing schemes for the different queries. The nature of the query also plays an important role in determining the energy-performance trade-offs. Further, technological trends and architectural enhancements are influencing factors on the relative behavior of the index structures. The work in the query has a bearing on how and where (on a mobile client or/and on a server) it should be performed for performance and energy savings. The results from this study will be beneficial for the design and implementation of embedded spatial databases, accelerating their deployment on numerous mobile devices. Received: November 11, 2001 / Accepted: March 12, 2002 Published online: November 14, 2002 This paper is a significantly extended version of preliminary work that appeared in the Proceedings of the Very Large Databases (VLDB) 2001 Conference. The extensions include (i) a comparison of indexing alternatives carrying out the operations in a brute-force manner; (ii) observations showing that datasets do play a role in power consumption; (iii) architectural solutions to address the cache and memory hotspots for energy; and (iv) benefits when off-loading the work to a server over a wireless medium compared to doing everything on the handheld device.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号